Spy Sweeper Help File© 1997 - 2003 Webroot Software, Inc. |
Quick Start - For quick instructions on how to use Spy Sweeper.
F.A.Q. - For answers to specific questions you have about Spy Sweeper.
Glossary - For definition of specific terms.
Following are quick instructions for using Spy Sweeper. For more information about any step, please refer to the Table of Contents, Frequently Asked Questions, and Glossary. You many also link directly to Help topics that are underlined in the steps below.
To sweep your computer for spies, complete the following steps.
Note: if you uninstall the Spy Sweeper program using the Uninstall program, all logs and quarantined traces will be deleted from your computer. To prevent this from happening, use the Restore Selected button in the Quarantine panel before uninstalling the Spy Sweeper program.
What is the difference between a full sweep and quick sweep?
What does it mean when the program is sweeping memory items?
What does it mean when the program is sweeping registry items?
How do I set up the program to sweep automatically?
What is the difference between spyware and a trace?
What does it mean to quarantine a spy?
Why do I need to quarantine spies before deleting them?
When would I not want to quarantine a spy?
When would I want to restore a quarantined spy?
How do I restore a quarantined spy?
Why should I delete quarantined spies?
How do I tell Spy Sweeper to ignore certain spies during a sweep?
How do I tell Spy Sweeper to quarantine certain spies automatically?
How do I get more information about a specific spy?
I don't think Spy Sweeper is finding a certain spy. How do I report this?
I can't find an answer to my question in this Help file. What can I do?
A spy, or spyware, is generally defined as any program that covertly gathers information through your Internet connection without your knowledge. Once installed, spyware programs monitor user activity on the Internet and transmit that information to interested parties. In addition to wasting bandwidth, spyware can gather information about e-mail addresses, keystrokes, cookies, and even passwords and credit card numbers. Spyware programs have been known to cause system failure and general system instability.
A full sweep performs an in-depth analysis of every item in your computer's memory, registry, and disk drives. It attempts to match each item with the name of a spyware program and with the information (fingerprints) used by Spy Sweeper to identify spies.
A quick sweep performs a surface analysis of your computer's memory and registry. It attempts to match each item only with the name of a spyware program. It does not attempt to match each item with the information (fingerprints) used by Spy Sweeper to identify spies. For that reason, a quick sweep may not identify all spies on your computer. It is recommended that you perform a full sweep periodically.
When Spy Sweeper sweeps items in memory, it searches for any spies that have been loaded into your computer's memory, or RAM. Your computer's memory contains running programs, which may include spies.
The registry is a special file that comes with your computer's operating system (such as Windows 2000). It stores configuration data about the users of the computer, installed programs, and the computer's hardware. The registry is required for your computer to run. Information in the registry is stored and organized differently from files on hard disks. For that reason, Webroot makes a special pass through the registry to check for spies.
The Options panel enables you to schedule automatic sweeps. Click the Options button on the Spy Sweeper window and then click the Schedule icon at the top of the panel. Refer to the Schedule (link) section of this Help file for more information.
Spyware refers to a spy program. When the spy program is loaded onto your computer, it can place itself in various items in your computer. For example, a spyware program can attach itself to a program running in memory, insert entries into the registry, and create files on your disk drives. These individual instances of spyware are referred to as traces.
Quarantining a spy prevents it from functioning, without actually deleting it from your computer. Spy Sweeper quarantines traces of the spyware by modifying the file name of the trace, removing the file from its original location, and placing it in a designated folder on your computer. The trace is disabled, although it remains on your computer using a different, unrecognizable, file name.
Some legitimate programs on your computer may have been bundled with adware. These programs might not function properly without the adware component. By quarantining the adware, you can check to make sure your system runs properly without the adware. If everything works properly, you can delete the spies. If everything does not work properly, you can restore the spies.
Yes, Spy Sweeper might identify an item as a spy, even if it is not a spy. Sometimes spyware traces are required by other programs to function properly. If the traces are quarantined, these programs might not work properly. For example, the KaZaA program is bundled with the spyware program Brilliant Digital. If Brilliant Digital is removed, KaZaA may not function properly.
Some spies may not be harmful, or they may be required to run certain programs on your computer. If the Remove Spies panel lists traces that you know are not spies, then you do not want to quarantine them. You can get a full description of a trace and its level of threat by right-clicking the trace in the Remove Spies panel.
If some of your programs do not work properly after you've quarantined a spy, the problem might be that the program needs the spy to function. In this case, you would restore the spy.
To restore a quarantined spy, open the Quarantine panel by clicking the Quarantined button on the Spy Sweeper window. Select the traces you wish to restore and then click the Restore Selected button. Refer to the Quarantine panel section of this Help file for more information.
You do not need to delete quarantined spies. However, if you are sure that the quarantined spies are not needed by other programs, you can delete them to free up space on your disk drive.
Yes. When you delete a quarantined spy, it is completely removed from your computer. Note, however, that the spy may be loaded again later by the program that initially loaded it. For example, if you are browsing the Internet, a previously removed adware program may attach itself again to a program in your computer.
To instruct Spy Sweeper to ignore certain spies, open the Options panel by clicking the Options button on the Spy Sweeper window. Click the Always Keep icon at the top of the panel. Select the spies you want to be ignored during a sweep. These spies will be ignored during every sweep, until you change this option. (The list of spies is compiled from the spies that have already been located on your computer.) Refer to the Always Keep (link) section of this Help file for more information.
To instruct Spy Sweeper to quarantine certain spies automatically, open the Options panel by clicking the Options button on the Spy Sweeper window. Click the Always Remove icon at the top of the panel. Select the spies you want to be quarantined automatically. These spies will be automatically quarantined (if applicable) during every sweep, until you change this option. (The list of spies is compiled from the spies that have already been located on your computer.) Refer to the Always Remove section of this Help file for more information.
If Spy Sweeper informs you that you should remove a spy manually, perform the following steps. Note, however, that you should not remove spies from your computer's registry unless you are an expert in this area.
If you are working with a Spy Sweeper panel that displays the name of a spyware program or trace, right-click the spy to link to the web site for more information.
To report spyware to Webroot, open the Options panel by clicking the Options button on the Spy Sweeper window. Click the Report Spyware button, which opens your web browser and links to the Webroot web site.
If you have any questions about using Spy Sweeper, contact technical support at support@webroot.com.
Adware is advertising-supported software that displays pop-up advertisements whenever the program is running. The software usually can be downloaded free from the Internet, and it is the advertisements that create revenue for the company. Although seemingly harmless (aside from intrusiveness and annoyance of pop-up ads), adware can install components onto your computer that track personal information (including your age, sex, location, buying preferences, surfing habits, etc.) for marketing purposes.
Most advertising supported software doesn't inform you that it installs adware on your system. Adware does require initial consent from you, but in many cases the software will not function without the adware component.
There have been reports that some adware can install itself on your computer even though you decline the offer.
Cookies are pieces of information that are generated by a web server as you browse the Internet, and then stored onto your computer for future access. Cookies were originally implemented to allow you to customize your web experience at sites you visit. However, some web sites now issue adware cookies, which allow multiple web sites to store and access cookies that may contain personal information (including surfing habits, user names and passwords, areas of interest, etc.), and then simultaneously share the information it contains with other web sites. This sharing of information allows marketing firms to create a user profile based on your personal information and sell it to other firms.
Adware cookies are installed and accessed without your knowledge or consent.
Memory, or RAM, is the area of your computer that contains information needed by running programs.
Quarantining a spyware trace means making the trace harmless to your computer, without actually deleting the trace. Spy Sweeper quarantines traces of the spyware by modifying the file name of the trace, removing the file from its original location, and placing it in a designated folder on your computer. The trace is disabled, although it remains on your computer using a different, unrecognizable, file name.
The registry is a special file that comes with your computer's operating system (such as Windows 2000). It stores configuration data about the users of the computer, installed programs, and the computer's hardware. The registry is required for your computer to run. Information in the registry is stored and organized differently from the files on hard disks.
A spy fingerprint is the information that Spy Sweeper uses to identify a specific spy.
Spyware, or a spy, is generally defined as any program that covertly gathers information through your Internet connection without your knowledge. Once installed, spyware programs monitor user activity on the Internet and transmit that information to interested parties.
In addition to wasting bandwidth, spyware can gather information about e-mail addresses, keystrokes, cookies, and even passwords and credit card numbers. Spyware programs have been known to cause system failure and general system instability.
When Spy Sweeper sweeps your computer, it searches for spies by analyzing all objects in your computer's memory, registry, and disk drives.
System monitors are applications designed to monitor computer activity to various degrees. These programs can capture virtually everything you do on your computer including recording all keystrokes, e-mails, chat room dialogue, web sites visited, and programs run. System monitors usually run in the background so that you do not know that you are being monitored. The information gathered by the system monitor is stored onto your computer in an encrypted log file for later retrieval. Some programs are capable of e-mailing the log files to another location.
Traditionally, system monitors had to be installed by someone with administrative access to your computer, such as a system administrator or someone that shares your computer. However, there has been a recent wave of system monitoring tools disguised as e-mail attachments or "freeware" software products.
A trace is one manifestation, or instance, of a spyware program. When a spyware program is loaded onto your computer, it can place itself in various items in your computer. For example, a spyware program can attach itself to a program running in memory, insert entries into the registry, and create files on your disk drives. These individual instances of spyware are referred to as traces.
Trojans are malicious programs that pretend to be harmless or desirable applications. The purpose of Trojans is to cause loss or theft of computer data, and to destroy your system. Some Trojans, called RATs (Remote Administration Tools), allow an attacker to gain unrestricted access of your computer whenever you are online. The attacker can perform activities such as file transfers, adding/deleting files or programs, and controlling the mouse and keyboard.
Trojans are distributed as e-mail attachments, or they can be bundled with another software program.
Spy Sweeper is capable of identifying and eliminating certain programs designed to collect information about you through your computer use. Not all of these items are necessarily harmful.
Spyware is generally defined as any program that covertly gathers information through your Internet connection without your knowledge. Once installed, spyware programs monitor user activity on the Internet and transmit that information to interested parties.
In addition to wasting bandwidth, spyware can gather information about e-mail addresses, keystrokes, cookies, and even passwords and credit card numbers. Spyware programs have been known to cause system failure and general system instability.
Adware:
Adware is advertising-supported software that displays pop-up advertisements whenever the program is running. The software usually can be downloaded free from the Internet, and it is the advertisements that create revenue for the company. Although seemingly harmless (aside from intrusiveness and annoyance of pop-up ads), adware can install components onto your computer that track personal information (including your age, sex, location, buying preferences, surfing habits, etc.) for marketing purposes.
Most advertising supported software doesn't inform you that it installs adware on your system. Adware does require initial consent from you, but in many cases the software will not function without the adware component.
There have been reports that some adware can install itself on your computer even though you decline the offer.
Adware Cookie:
Cookies are pieces of information that are generated by a web server and stored onto your computer for future access. Cookies were originally implemented to allow you to customize your web experience at sites you visit. However, some web sites now issue adware cookies, which allow multiple web sites to store and access cookies that may contain personal information (including surfing habits, user names and passwords, areas of interest, etc.), and then simultaneously share the information it contains with other web sites. This sharing of information allows marketing firms to create a user profile based on your personal information and sell it to other firms.
Adware cookies are installed and accessed without your knowledge or consent.
System Monitor:
System monitors are applications designed to monitor computer activity to various degrees. These programs can capture virtually everything you do on your computer including recording all keystrokes, e-mails, chat room dialogue, web sites visited, and programs run. System monitors usually run in the background so that you do not know that you are being monitored. The information gathered by the system monitor is stored onto your computer in an encrypted log file for later retrieval. Some programs are capable of e-mailing the log files to another location.
Traditionally, system monitors had to be installed by someone with administrative access to your computer, such as a system administrator or someone that shares your computer. However, there has been a recent wave of system monitoring tools disguised as e-mail attachments or "freeware" software products.
Trojan:
Trojans are malicious programs that pretend to be harmless or desirable applications. The purpose of Trojans is to cause loss or theft of computer data, and to destroy your system. Some Trojans, called RATs (Remote Administration Tools), allow an attacker to gain unrestricted access of your computer whenever you are online. The attacker can perform activities such as file transfers, adding/deleting files or programs, and controlling the mouse and keyboard.
Trojans are distributed as e-mail attachments, or they can be bundled with another software program.
During installation, you have an option to include an icon for Spy Sweeper on the desktop. To launch the Spy Sweeper program after it is installed, you can double-click this icon.
You may also place an item for Spy Sweeper on the Programs menu. To run Spy Sweeper using the Programs menu:
After you start the program, the Spy Sweeper window is displayed. To sweep your computer for spies, complete the following steps.
Note: if you uninstall the Spy Sweeper program using the Uninstall program, all logs and quarantined traces will be deleted from your computer. To prevent this from happening, use the Restore Selected button in the Quarantine panel before uninstalling the Spy Sweeper program.
The Spy Sweeper window consists of the activity panel on the right, the status area below the activity panel, and the navigation panel on the left. Two button also appear along the top of the window.
The activity panel changes, depending on the activity you have selected. For example, if you click the Quick Sweep button, the Quick Sweep panel is displayed. Each activity panel may contain its own set of buttons.
The status area displays information about the sweep, as the sweep is running. It may also display other information, such as the date and time of the next scheduled sweep.
The buttons on the navigation panel and the top of the window remain on the Spy Sweeper window all the time, regardless of the activity panel that is displayed. Following is a description of each button.
Subscription Service - This link notifies you of your Spy Sweeper subscription status.
The Quick Sweep panel is used to perform a surface analysis of your computer's memory, registry, and disk drives. Clicking the Start button begins the sweep. When a sweep is in progress, the Stop button enables you to stop the sweep.
When performing a sweep, Spy Sweeper first loads the spy fingerprints, which consist of information used to identify specific spies. Next, Spy Sweeper sweeps your computer's memory. If it encounters a spy in memory, you are immediately given the option to remove it from memory. (If you choose not to remove it, you will not have another opportunity to remove it until you perform another sweep.)
After sweeping all memory objects, Spy Sweeper sweeps your system registry and then sweeps the disk drives.
Information about the current sweep is displayed in the Quick Sweep panel and in the status area. The information sections in the Quick Sweep panel display a running total of items inspected and found.
When the sweep is complete (or has been stopped) and if a spy has been found, the Next button becomes active. Clicking this button displays the Remove Spies panel, which contains a list of all spyware found during the sweep.
The Full Sweep panel is used to perform an in-depth analysis of every item in your computer's memory, registry, and disk drives. Clicking the Start button begins the sweep. When a sweep is in progress, the Stop button enables you to stop the sweep.
When performing a sweep, Spy Sweeper first loads the spy fingerprints, which consist of information used to identify specific spies. Next, Spy Sweeper sweeps your computer's memory. If it encounters a spy in memory, you are immediately given the option to remove it from memory. (If you choose not to remove it, you will not have another opportunity to remove it until you perform another sweep.)
After sweeping all memory objects, Spy Sweeper sweeps your system registry and then sweeps the disk drives.
Information about the current sweep is displayed in the Quick Sweep panel and in the status area. The information sections in the Quick Sweep panel display a running total of items inspected and found.
When the sweep is complete (or has been stopped) and if a spy has been found, the Next button becomes active. Clicking this button displays the Remove Spies panel, which contains a list of all spyware found during the sweep.
The Remove Spies panel displays a list of all spyware found during the most recent sweep. You can display this panel by clicking the Next button in the Quick Sweep panel or Full Sweep panel, or by clicking the Remove button on the Spy Sweeper screen.
Next to the name of each spyware program is a plus sign (+). Clicking the plus sign expands the spyware item and displays the individual traces of the spyware. One spyware program can manifest itself in various items in your computer. These individual instances of spyware are referred to as traces.
Use the Remove Spies panel to quarantine one or more spyware traces. Quarantining a spyware trace means making the trace harmless to your computer, without actually deleting the trace. Spy Sweeper quarantines traces of the spyware by modifying the file name of the trace, removing the file from its original location, and placing it in a designated folder on your computer. The trace is disabled, although it remains on your computer using a different, unrecognizable, file name.
By default, Spy Sweeper selects all spyware traces to be quarantined. If you do not want specific traces to be quarantined, click the check box to remove the check mark. Clicking the check box next to a spyware name deselects all traces of the spyware. Clicking the Deselect All button removes the check mark from all items. Clicking the Select All button adds a check mark to all items.
Note that if you have configured Spy Sweeper to ignore specific spies, those traces will not be displayed. The Options panel enables you to specify which spies to ignore and which spies to delete automatically.
For more information about a spyware program or trace, click the spyware name or trace name. The Spyware Name, Location, Fingerprint Type, and Category is then displayed. You can also right-click on a spyware program or trace, which enables you to go the Webroot web site for more information about the spy.
Once you have selected or deselected the traces to be quarantined, click the Next button to quarantine the items.
After you click the Next button to quarantine spies, you might see a message informing you that Spy Sweeper cannot remove a specific spy. To remove the spy manually, perform the following steps. Note, however, that you should not remove spies from your computer's registry unless you are an expert in this area.
The Results panel offers two different information displays. By default, the Summary display appears when the Results panel is opened. The Summary consolidates information about the most recent sweep, such as number of traces found and how many minutes it took to complete the sweep.
Clicking the Session Log icon displays information about the sweeps previously completed by Spy Sweeper.
The Summary display consolidates information about the most recent sweep. This summary is accessible until another sweep is completed.
When Spy Sweeper performs a sweep, it stores information about the sweep in the Sessions History Log. This log contains information such as the date and time the sweep was performed, details about the sweep process, and the locations of spyware traces that were quarantined. The Sessions History Log is accessible by clicking the Session Log icon in the Results panel.
Every time a sweep is performed, information about the sweep session is added to the Sessions History Log. By default, Spy Sweeper stores up to 20 sweep sessions in the log. You can change the number of sessions stored using the Max Number of Session Histories Saved field.
To save the log information in a text file, click the Save to File button. The Save As dialog box then appears, which you use to select a folder and file name.
To remove all information from the Sessions History Log, click the Clear Session History button.
When you quarantine a spyware trace using the Remove panel, Spy Sweeper modifies the file name of the trace, removes the file from its original location, and places it in a designated folder on your computer. The trace is disabled, although it remains on your computer using a different, unrecognizable, file name. The Quarantine folder contains a list of these traces. This folder is accessible by clicking the Quarantined button on the Spy Sweeper window.
The Quarantine folder groups traces with their associated spyware program. Next to the name of each spyware program is a plus sign (+). Clicking the plus sign expands the spyware item and displays the following information about the individual traces of the spyware:
The Quarantine panel enables you to delete or restore quarantined traces. For more information about when you should delete traces, click here. For more information about when you should restore traces, click here.
The four buttons in the Quarantine panel enable you to delete or restore one or more quarantined traces. By default, no traces are selected.
To select all traces created by all spyware programs, click the Select All button. A check mark is then added to every item.
To cancel your selection of quarantined traces, click the Deselect All button. All check marks are removed.
To select specific quarantined traces, click the check box next to the trace to add a check mark. Clicking the check box next to the spyware program name selects all traces. You can remove a check mark by clicking the check box again.
Once you have selected traces, you can remove them from your computer by clicking the Delete Selected button.
To restore selected spyware traces, click the Restore Selected button. Each selected trace is renamed using its original file name and restored to its original location.
The Options panel enables you to schedule sweeps and to customize Spy Sweeper features. This panel is accessible by clicking the Options button on the Spy Sweeper window.
Options are grouped by category. Clicking an icon at the top of the panel displays the related set of options. By default, the Configure options are displayed when you first open the panel.
Some options are represented by check boxes. You may select multiple check box options. Just click a check box to add a check mark. Clicking the check box again removes the check mark.
Some options are represented by option buttons (circles). You may select only one option button within a group. Clicking an empty option button selects that option and deselects the previously selected option.
The status area in the panel displays the date and time the next sweep is scheduled, if applicable.
The Configure section enables you to customize various features of Spy Sweeper.
Sweep which hard drives?:
Sweep Priority Level:
The Schedule section enables you to instruct Spy Sweeper to perform a full sweep on a specified day or according to a specific time period. Note that if your computer is turned off during the scheduled sweep time, the sweep will not be performed.
The Home Page Protection section enables you to protect your Internet Explorer browser home page from being hijacked by spyware programs.
IE Home Page Protection:
Protected Home Page:
The Always Keep section enables you to instruct Spy Sweeper to ignore certain spies when a sweep is performed. Traces of the spies you select will not appear in the Remove Spies panel after a sweep.
The list of spies in the Always Keep panel is compiled from the spies that have already been located on your computer. To select a spy, click the check box next to the spyware name to add a check mark. To deselect a spy, remove the check mark by clicking the check box.
The Always Remove section enables you to instruct Spy Sweeper to quarantine certain spies automatically when a sweep is performed. Traces of the spies you select will automatically be placed in the Quarantine folder during the next sweep.
The list of spies in the Always Remove panel is compiled from the spies that have already been located on your computer. To select a spy, click the check box next to the spyware name to add a check mark. To deselect a spy, remove the check mark by clicking the check box.
The Webroot Products section contains buttons linking to web pages that describe other Webroot products. Your computer must be connected to the Internet to view these pages.
When you register Spy Sweeper, you are entitled to FREE updates, technical support, and replacement downloads for the length of your subscription. To obtain your update, click the Check for Update button in the Configure section of the Options panel. (You must be connected to the Internet to check for updates.) Webroot Software's Update Software web page is then displayed, and Spy Sweeper searches the Webroot web site for updates to your existing software. If there is an update available, you are given options and directions on how to update your software.
If the Spy Sweeper program does not work as expected, review the following information:
Is your computer on a network?
When Spy Sweeper attempts to quarantine a trace on a disk drive, it needs to rename the trace file. If you do not have the permissions required to rename files, Spy Sweeper is unable to quarantine the trace. It can, however, identify the trace. Check with your system administrator to gain the required permissions.
Are you using Windows XP?
When Spy Sweeper attempts to quarantine a trace on a disk drive, it needs to rename the trace file. If you are logged on to a Windows XP machine as a non-Administrator user, you might not have the permissions required to rename files. Check with the person using the Administrator logon to gain permissions, or to use the Administrator logon when running Spy Sweeper.
Error Messages
When downloading new spy definitions using the Update Definitions button in the Configure section of the Options panel, you may encounter the following error messages. In general, the best solution is to try the download later.
Error: "There seems to be problems reaching the server. The cause may be in your connection, or on the server. Please try again later."
Error: "A problem was experienced, please try again."
Error: "Your installation appears incomplete. Please reinstall the software."
END USER LICENSE AGREEMENT
Software License Agreement for Webroot Software, Inc.
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. WEBROOT SOFTWARE, INC. IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS "YOU" OR "YOUR") ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND WEBROOT SOFTWARE. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE "AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK ON THE "I DO NOT AGREE", "NO" BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM WHOM IT WAS ACQUIRED WITHIN SIXTY (60) DAYS OF PURCHASE, AND YOUR MONEY WILL BE REFUNDED.
LICENSE AND WARRANTY:
The software that accompanies this license is the property of Webroot Software, Inc. ("Webroot") or its licensors and is protected by copyright law. While Webroot continues to own the Software, you will have certain rights to use the Software after your acceptance of this license. This license governs any releases, revisions, or enhancements to the Software that Webroot may furnish to you. Except as may be modified by a Webroot site license certificate, which accompanies, precedes, or follows this license, your rights and obligations with respect to the use of this Software are as follows:
IF YOU AGREE TO THE PRODUCT DISCLAIMER AND LICENSE YOU MAY:
install and use one copy of the Software on a single computer. If a Site License accompanies, precedes, or follows this license, you may make the number of copies of the Software licensed to you by Webroot as provided in your Site License;
access customer support as provided for (and for the term outlined) in your original purchase agreement or site license.
YOU MAY NOT:
sublicense, rent or lease any portion of the Software; reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software, or create derivative works from the Software;
copy the printed documentation which accompanies the Software;
use the Software in any manner not authorized by this license.
SOFTWARE UPDATES
From time to time, Webroot may make available updates to the Software. You may download and install those updates to the Software that are released by Webroot within one year of your Software registration date. Your purchase must be recorded with Webroot Software either through product registration or a direct purchase through www.webroot.com to be notified of software updates. All updates to the Software are governed by this Agreement, unless other license terms are provided with the update.
CONTENT UPDATES
Certain Webroot Software products utilize content that is updated from time to time (spyware products utilize updated spyware definitions; content filtering products may utilize updated URL lists; firewall products utilize updated firewall rules; collectively, these are referred to as "Content Updates"). You may obtain Content Updates for any period for which you have purchased a subscription for Content Updates for the Software (including any subscription included with your original purchase of the Software), entered into a maintenance agreement that includes Content Updates, or otherwise separately acquired the right to obtain Content Updates. This license does not otherwise permit you to obtain and use Content Updates.
DISCLAIMER OF DAMAGES:
Some states and countries, including member countries of the European economic area, do not allow the limitation or exclusion of liability for incidental or consequential damages so the below limitation or exclusion may not apply to you. To the maximum extent permitted by applicable law and regardless of whether any remedy set forth herein fails of its essential purpose, in no event will Webroot or its licensors be liable to you for any special, consequential, indirect or similar damages, including any lost profits or lost data arising out of the use or inability to use the software even if Webroot has been advised of the possibility of such damages. In no case shall Webroot's or its licensors' liability exceed the purchase price for the software. The disclaimers and limitations set forth above will apply regardless of whether you accept the Software.
RESERVATION OF RIGHTS
U.S. Government Restricted Rights: RESTRICTED RIGHTS LEGEND. All Webroot products and documentation are commercial in nature. The software and software documentation are "Commercial Items", as that term is defined in 48 C.F.R. section 2.101, consisting of "Commercial Computer Software" and "Commercial Computer Software Documentation", as such terms are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R. section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and 48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R. section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section 227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other relevant sections of the Code of Federal Regulations, as applicable, Webroot's computer software and computer software documentation are licensed to United States Government end users with only those rights as granted to all other end users, according to the terms and conditions contained in this license agreement. Manufacturer is Webroot Software Inc., PO Box 19816, Boulder CO 80308.
GENERAL:
This Agreement is governed by the laws of the State of Colorado. This Agreement and any related license addendum or written document signed by both you and Webroot Software. Inc. which accompanies this license is the entire agreement between You and Webroot relating to the Software and: (i) supersedes all prior or contemporaneous oral or written communications, proposals and representations with respect to its subject matter; and (ii) prevails over any conflicting or additional terms of any quote, order, acknowledgment or similar communications between the parties. This Agreement shall terminate upon Your breach of any term contained herein and You shall cease use of and destroy all copies of the Software. The disclaimers of warranties and damages and limitations on liability shall survive termination. Should you have any questions concerning this Agreement, or if you desire to contact Webroot Software for any reason, please write: Webroot Software Inc., PO Box 19816, Boulder CO 80308.
© 1997 - 2003 Webroot Software, Inc. All Rights Reserved |